{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00186519","sets":["1164:6389:9385:9386"]},"path":["9386"],"owner":"11","recid":"186519","title":["Graphical Lasso を用いたダークネットデータのリアルタイム分析に基づくマルウェア活動検知に関する検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-02-28"},"_buckets":{"deposit":"7702d2db-aa89-4f8e-b0e6-3c4b4a8bff86"},"_deposit":{"id":"186519","pid":{"type":"depid","value":"186519","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Graphical Lasso を用いたダークネットデータのリアルタイム分析に基づくマルウェア活動検知に関する検討","author_link":["418555","418556","418557","418554","418563","418562","418553","418560","418558","418559","418564","418566","418561","418565"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Graphical Lasso を用いたダークネットデータのリアルタイム分析に基づくマルウェア活動検知に関する検討"},{"subitem_title":"A Study on Malware Activity Detection Based on Real-time Analysis of Darknet Data Using Graphical Lasso","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Network Security","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2018-02-28","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"九州大学大学院システム情報科学府"},{"subitem_text_value":"株式会社クルウィット"},{"subitem_text_value":"情報通信研究機構サイバーセキュリティ研究所"},{"subitem_text_value":"情報通信研究機構サイバーセキュリティ研究所"},{"subitem_text_value":"九州大学大学院システム情報科学府"},{"subitem_text_value":"九州大学大学院システム情報科学府/情報通信研究機構サイバーセキュリティ研究所"},{"subitem_text_value":"情報通信研究機構サイバーセキュリティ研究所"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Clwit Inc.","subitem_text_language":"en"},{"subitem_text_value":"Cybersecurity Research Institute, National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"Cybersecurity Research Institute, National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Electrical Engineering, Kyushu University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information Science and Electrical Engineering, Kyushu University / Cybersecurity Research Institute, National Institute of Information and Communications Technology","subitem_text_language":"en"},{"subitem_text_value":"Cybersecurity Research Institute, National Institute of Information and Communications Technology","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/186519/files/IPSJ-SPT18027001.pdf","label":"IPSJ-SPT18027001.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT18027001.pdf","filesize":[{"value":"2.0 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"ee726f4a-e701-406a-b1b3-60703bec1edb","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2018 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"韓, 燦洙"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"島村, 隼平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高橋, 健志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"井上, 大介"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"川喜田, 雅則"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"竹内, 純一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中尾, 康二"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Chansu, Han","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jumpei, Shimamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takeshi, Takahashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Daisuke, Inoue","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masanori, Kawakita","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jun'ichi, Takeuchi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koji, Nakao","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究ではダークネットトラフィックデータからサイバー空間での悪性の活動 (特に,ボットネット) を 自動的かつリアルタイムに検知する手法を検討する.Graphical Lasso アルゴリズムを用い,トラフイックデータから 送信元ホスト間の協調関係を捉え,その尺度としてグラフ密度を用いて異常検知をする手法が研究された.我々はその手法を発展させ,新たなアラート判定法より,悪性の活動をリアルタイムに検知する手法を提案する. この評価実験では,実際のダークネットトラフィックに対して提案方式を用いた分析を実施するツールを実装し, リアルタイムで動作をしていることを確認した.同時に,プログラムの計算時間を短縮し,アラート発行の精度を向上させるためのパラメータチューニングの評価を行った.最後に常時運用において検知したアラートの事例を紹介する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In this study, we considered a method to detect malignant activity (especially botnet) in cyber space automatically and in real-time from darknet traffic data. A method to grasp the cooperative relationship between the source hosts from the traffic data based on the graph density obtained by the Graphical Lasso algorithm, and to detect abnormality was studied. We developed the method and proposed a method to detect malignant activities in real-time by using a new alert judgment method. In our research, we implemented a tool to carry out the analysis using the proposed method against actual darknet traffic and confirmed that it operates in real-time. At the same time, we shortened the program calculation time and evaluated parameter tuning. Finally, we introduced examples of malicious activities detected in continuous operation.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2018-02-28","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicVolumeNumber":"2018-SPT-27"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":186519,"updated":"2025-01-20T02:32:57.487547+00:00","links":{},"created":"2025-01-19T00:53:28.129157+00:00"}